Follow Dark Reading:
 November 01, 2021
LATEST SECURITY NEWS & COMMENTARY
APTs, Teleworking, and Advanced VPN Exploits: The Perfect Storm
A Mandiant researcher shares the details of an investigation into the misuse of Pulse Secure VPN devices by suspected state-sponsored threat actors.
Cybercriminals Take Aim at Connected Car Infrastructure
While car makers are paying more attention to cybersecurity, the evolution of automobiles into "software platforms on wheels" and the quick adoption of new features has put connected cars in the crosshairs.
A Treehouse of Security Horrors
True-life horrors from conversations with software engineers and developers. D'oh!
Russian National Accused of Role in Trickbot Is Extradited to US
Court documents say Vladimir Dunaev is alleged to have been a malware developer for the Trickbot Group.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
SEO Poisoning Used to Distribute Ransomware
This tactic — used to distribute REvil ransomware and the SolarMarker backdoor — is part of a broader increase in such attacks in recent months, researchers say.

SolarWinds Attacker Targets Cloud Service Providers in New Supply Chain Threat
Microsoft says the group has attacked more than 140 service providers and compromised 14 of them between May and October of this year.

What Squid Game Teaches Us About Cybersecurity
When life inside the security operations center feels treacherous, here are some suggestions for getting out alive.

MORE
EDITORS' CHOICE

6 Ways to Rewrite the Impossible Job Description
It's hard enough to fill a cybersecurity position given the talent shortage. But you may be making it harder with a poor job description that turns off would-be candidates.
LATEST FROM THE EDGE

What Exactly Is Secure Access Service Edge (SASE)?
Any company that supports a hybrid workforce should at least be familiar with this relatively new security approach.
LATEST FROM DR TECHNOLOGY

Enterprises Allocating More IT Dollars on Cybersecurity
Enterprises are allocating more IT dollars towards implementing a multilayered approach to securing data and applications against new threats, data shows.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Building Automation Into Secure Application Development

    Creating secure code is crucial to enterprise application development. But many application developers resist taking extra security steps because they add extra work and time to the development process. In this Dark Reading webinar, application security experts discuss ways to ...

  • Zero-Trust in Real Life

    Credential theft, lateral movement and other cyber attack tricks have foiled perimeter security again and again. We know that the old philosophy of trusting everything and everyone inside a network is no longer sound. The zero-trust model - trust nothing, ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.